I'm familiar with the breach they experienced. However, they did force
a password reset on all accounts, and if yours was sufficiently strong
I'd say you would have little to worry about. I know on a long enough
time line it will be crack, but when I'm dead will I actually care?
Probably not. Still, you raise an important point. You must trust the
system you're using for password management. If you don't trust it don't
use it. At the time of the breach I was leery of them too and only had 2
passwords stored in their system. I was managing my passwords in a gpg
encrypted text file that I opened transparently with vim. This model
isn't very portable as there are sync'ing issues and the lack
availability of vim on mobile phones means that I could readily access
my passwords on the go.
On 11.11.2012 09:58, Alex Kornilov wrote:
On 11/11/12 2:50 PM, Jon Molesa wrote:
I use LastPass. It isn't open-source, but it is cross-platform,
works on all devices, sync's with the cloud, is only $12/yr, and
offers sereral two-factor options. I personally use a yubikey. It
allows you to generate one-time passwords for use on untrusted
networks as well. I don't trust the cloud.
Google "+lastpass +security +breach"
Alex
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com
--
Jon Molesa
[email protected]
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com